Re: Strange ip_conntrack values

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> Tcpdump is a good packet sniffer but it does not show the data in a
> user-friendly format.

I've tried to load my tcpdump file but ethereal doesn't recognize it
... is there a way to configure tcpdump fot that ?

my data are like this :

04:30:00.662037 IP deathpolka.nyogtha.org.62238 > mydomaine.net.http:
. ack 3067679957 win 64240
04:30:00.662331 IP sts-12e87.adsl.wanadoo.nl.4164 >
mydomaine.net.http: . ack 3331465322 win 17520
04:30:00.662617 IP deathpolka.nyogtha.org.62238 > mydomaine.net.http:
F 0:0(0) ack 1 win 64240

> I suggest you install ethereal on a machine (does not have to be the firewall)
> and load the tcpdump output file into that.   It will help show you the
> connections in a meaningful format, and you can look for FIN-ACK packets
> which are not replied, multiple FIN-ACKs, etc.
> 
> Also, do you have a snapshot of /proc/net/ip_conntrack from any time during
> 4am-6am?   If not, I suggest you take another tcpdump log (rather than 2
> hours, I suggest something much shorter, say 10 minutes, because the timer
> you are interested in expires after 2 minutes, so you should get enough
> examples of whatever's happening within a 10 minute window), and take a
> snapshot of /proc/net/ip_conntrack at the start and end of the tcpdump log
> (perhaps a couple of times in the middle as well).
> 
> That should give you a traffic stream (of a manageable size) to look at in
> ethereal and compare to the contents of the conntrack table to work out where
> the TIME_WAIT entries are coming from.

ok good idea I'll try this tonight

> By the way, you're not blocking any packets which are important to closing
> connections, are you?   Such as FIN-ACK or RST?   Maybe checking the packet
> counters from "iptables -L -nvx; iptables -L -t nat -nvx" might show
> something interesting?

I'm not enough experienced to try to interpret it . here is a copy if
u can have a look, I've not seen something too strange :

thanks for your help

Chain INPUT (policy DROP 15947 packets, 1548815 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination
    3251   196544 MALFORMED  all  --  *      *       0.0.0.0/0        
   0.0.0.0/0          state INVALID
       0        0 MALFORMED  all  -f  *      *       0.0.0.0/0        
   0.0.0.0/0
       1       40 MALFORMED  tcp  --  *      *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp flags:0x3F/0x03
       0        0 MALFORMED  tcp  --  *      *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp flags:0x3F/0x29
  846218 117145998 ACCEPT     udp  --  *      *       0.0.0.0/0       
    0.0.0.0/0          state RELATED,ESTABLISHED
       0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0        
   0.0.0.0/0          state RELATED tcp flags:!0x16/0x02
     162     7916 ACCEPT     tcp  --  *      *       0.0.0.0/0        
   0.0.0.0/0          state RELATED tcp flags:0x16/0x02
 2156908 103774704 ACCEPT     tcp  --  *      *       0.0.0.0/0       
    0.0.0.0/0          state ESTABLISHED tcp flags:0x16/0x02
423113683 25328463653 ACCEPT     tcp  --  *      *       0.0.0.0/0    
       0.0.0.0/0          state ESTABLISHED tcp flags:!0x16/0x02
   15377  1042496 ACCEPT     all  --  lo     *       127.0.0.1        
   0.0.0.0/0
   78330  4735198 ACCEPT     all  --  lo     *       MYIP        MYIP
    4288   339738 ACCEPT     udp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          udp spt:53
   37115  2929800 ACCEPT     udp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          udp dpt:53
       6      240 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          tcp spt:53
      36     1528 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          tcp dpt:53
130986256 6441434116 ACCEPT     tcp  --  eth0   *       0.0.0.0/0     
      0.0.0.0/0          state NEW tcp dpt:80 flags:0x16/0x02
  440496 18258310 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:80 flags:!0x16/0x02
     123     6156 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:22 flags:0x16/0x02
     317    15508 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:21 flags:0x16/0x02
    6190   318804 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:25 flags:0x16/0x02
    5747   278968 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:110 flags:0x16/0x02
    1750    84000 ACCEPT     tcp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          state NEW tcp dpt:10000 flags:0x16/0x02
   39411  3711874 ACCEPT     icmp --  eth0   *       0.0.0.0/0        
   0.0.0.0/0
   95124  7419672 REJECT     udp  --  eth0   *       0.0.0.0/0        
   0.0.0.0/0          udp dpt:137 reject-with icmp-port-unreachable
   15552  1469086 LOG        all  --  *      *       0.0.0.0/0        
   0.0.0.0/0          limit: avg 1/sec burst 5 LOG flags 0 level 4
prefix `IPT [DROPED] : '

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination

Chain OUTPUT (policy ACCEPT 325971709 packets, 53608243217 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination

Chain MALFORMED (4 references)
    pkts      bytes target     prot opt in     out     source         
     destination
    3196   193448 LOG        all  --  *      *       0.0.0.0/0        
   0.0.0.0/0          limit: avg 1/sec burst 5 LOG flags 0 level 4
prefix `IPT [MALFORMED] : '
    3252   196584 REJECT     all  --  *      *       0.0.0.0/0        
   0.0.0.0/0          reject-with icmp-port-unreachable
Chain PREROUTING (policy ACCEPT 127860795 packets, 6290596491 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination

Chain POSTROUTING (policy ACCEPT 140964 packets, 10420602 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
    pkts      bytes target     prot opt in     out     source         
     destination


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux